Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe
Resource
win10v2004-20240508-en
General
-
Target
ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe
-
Size
2.2MB
-
MD5
ddfbc3b32cbe7636e8976d8a4aee4a00
-
SHA1
baa8bb1168d9ee2e2f57646394cdc0760a61a133
-
SHA256
7b76d9fb50dc5f83d25b339efe8dc7f66c6d645cc3b14f1e4b8091ef4220ea42
-
SHA512
76273c96d61588601194f4dd0e2557b05c45a3a6688c8d1014159bc2c6ec590bc809a9f24464e9058d2416725f944d0c412047da9360df21cb1f376eaa1f696e
-
SSDEEP
49152:ozTmfXYjqGUBL6F7+8Pu/ZF26QreE26pKdzj58oz9InwWlLoZot:IuCqmF7+FSrLadz98U9B
Malware Config
Extracted
asyncrat
0.5.8
Default
tomx.brasilia.me:6606
tomx.brasilia.me:7707
tomx.brasilia.me:8808
91.92.250.227:6606
91.92.250.227:7707
91.92.250.227:8808
vWKJAJDsDf09
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/2332-2-0x0000000005BA0000-0x0000000005DC0000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-5-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-12-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-48-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-52-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-50-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-46-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-44-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-42-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-38-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-36-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-34-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-30-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-28-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-26-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-24-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-40-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-32-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-22-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-20-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-16-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-14-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-10-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-8-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-6-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-18-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-68-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-66-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-64-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-62-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-60-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-58-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-56-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-54-0x0000000005BA0000-0x0000000005DBA000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Iyqaqwilwoz = "C:\\Users\\Admin\\AppData\\Roaming\\Iyqaqwilwoz.exe" ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2332 set thread context of 3392 2332 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 84 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2332 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe Token: SeDebugPrivilege 2332 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe Token: SeDebugPrivilege 3392 AppLaunch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2332 wrote to memory of 3392 2332 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 84 PID 2332 wrote to memory of 3392 2332 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 84 PID 2332 wrote to memory of 3392 2332 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 84 PID 2332 wrote to memory of 3392 2332 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 84 PID 2332 wrote to memory of 3392 2332 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 84 PID 2332 wrote to memory of 3392 2332 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 84 PID 2332 wrote to memory of 3392 2332 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 84 PID 2332 wrote to memory of 3392 2332 ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe"C:\Users\Admin\AppData\Local\Temp\ddfbc3b32cbe7636e8976d8a4aee4a00_NEIKI.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3392
-